SlideShare a Scribd company logo
1 of 52
2
Esensi Computer Security Dalam Era Digitalisasi
Security
▪ Tujuan
▪ Mencegah kehilangan/kerusakan data
▪ Mencegah pencurian/pembocoran data
▪ Penanganan insiden
▪ Sumber masalah
▪ Bencana alam
▪ Hacker, pencuri, virus
▪ Diri sendiri
3
4
1. INTRO
5
Minneapolis, 2003
6
Pengenalan: data
▪ Data adalah kumpulan fakta:
personal / organizational
▪ Daftar nomor telepon
▪ Hasil rekaman CCTV
▪ Transaksi kartu kredit
▪ Foto-foto
▪ Data yang sudah diolah dan
memiliki makna substansial
disebut informasi
7
Pengenalan: ancaman
▪ Ancaman (threats) pada data:
kehilangan/kerusakan data, pencurian data
(kebocoran rahasia) karena
▪ Bencana alam
▪ Orang lain (hacker, pencuri, malware, dll)
▪ Diri sendiri
8
Pengenalan: resiko
▪ Financial loss
▪ Unavailability of resources
▪ Identity theft & fraud
▪ Loss of trust
▪ Data loss / theft
▪ Misuse of computer resources
9
Pengenalan: keamanan
▪ Tujuan: mencegah data hilang, data rusak &
menangani insiden
▪ Elemen keamanan informasi
▪ Confidentiality
▪ Authenticity
▪ Integrity
▪ Availability
▪ Nonrepudiation
10
Pengenalan: implementasi
▪ Precaution: antivirus, firewall, strong
password, dll.
▪ Maintenance: backup, update patch, resource
monitoring, dll.
▪ Reaction: power off, disconnect, reinstall,
restore, dll.
11
12
13
14
15
2. SISTEM OPERASI
OS
▪ Fungsi sistem operasi:
▪ Mengontrol I/O
▪ Mengelola file dan folder
▪ Menangani resources
▪ Mengamankan perangkat dan data
▪ Aktivitas pengamanan OS:
▪ Update patch
▪ Penggunaan antivirus & firewall
▪ Enkripsi
▪ Konfigurasi akun user
▪ Monitoring proses, services, dll
▪ Backup & recovery
16
OS: Fitur Penting
▪ Windows 10
▪ Windows security (firewall, defender)
▪ Family options
▪ Backup options (system image, file history)
▪ Encryption (EFS, BitLocker)
▪ Jump list
▪ UAC
▪ Mac OS X
▪ Parental Control
▪ Time Machine
▪ Encryption (FileVault)
▪ Automatic login
17
18
3. MALWARE
Malware
▪ Virus
▪ Trojan
▪ Worm
▪ Spyware
▪ Ransomware
▪ Rootkit
▪ ...
19
20
21
Malware: Ciri-ciri
▪ Slow
▪ Pop up
▪ Crash / BSOD
▪ Suspicious hard drive activity
▪ Antivirus, firewall, update disabling
▪ New browser homepage
▪ Peculiar program activity
▪ Random network activity
▪ Blacklisted IP address
22
Antivirus
▪ Kompatibel?
▪ Kualitas?
▪ Efektivitas
▪ Frekuensi update
▪ Efisiensi
▪ Mudah digunakan?
▪ Harga?
23
Antivirus
▪ Techniques
▪ Scanning
▪ Integrity checking
▪ Actions
▪ Clean
▪ Quarantine
▪ Delete
24
Antivirus
▪ Limitation
▪ Limited detection
techniques
▪ Doesn’t fully
protect
▪ Slows down
PC/network
▪ Conflicts
25
26
4. INTERNET
Internet
▪ Ancaman keamanan di Internet
▪ Data: pembocoran, pencurian identitas, penipuan
melalui social engineering
▪ Malware
▪ Keamanan anak:
▪ Pornografi: stealth sites, misdirected search/URL,
iklan-iklan
▪ Cyberbullying: medsos, chat room, email
▪ Pedofil: medsos, chat room, email
27
Internet: browser
28
29
Internet: browser
▪ Mengamankan browser:
▪ Konfigurasi keamanan dan privasi, tracking, cookie, filter
▪ Update patch
▪ Memonitor alerts
▪ Menghindari wi-fi publik
▪ Menginstall plugin keamanan
▪ Menggunakan website HTTPS
▪ Menonaktifkan script: Java, ActiveX, cookies, extension
30
Internet: IM
▪ Fitur-fitur
▪ Chat
▪ Mengirim gambar, video, tautan, musik
▪ File sharing
▪ Ancaman keamanan
▪ Privasi
▪ Identitas palsu
▪ Malware
31
Internet: keamanan anak
▪ Ancaman keamanan anak di Internet:
▪ Cyberbullying
▪ Pornografi
▪ Stealth site
▪ Misdirected search
▪ Grooming
▪ Ancaman di media sosial
▪ Spam
▪ Ancaman di chat rooms
32
Internet: keamanan anak
▪ Langkah-langkah melindungi anak dari masalah
online:
▪ Pencegahan: pendidikan, monitoring, limitasi
▪ Kenali ciri-ciri anak yang mengalami masalah online
▪ Latih anak agar melaporkan hal-hal mencurigakan
▪ Apa yang harus dilakukan jika anak menjadi
korban:
▪ Abaikan semua komunikasi dari predator
▪ Hentikan aktivitas di situs/media tersebut
▪ Blokir akun-akun yang terkait
▪ Jika perlu: hapus akun anak
33
34
5. MEDSOS
35
36
Medsos
▪ Media sosial: situs/aplikasi online untuk
terhubung, dan berbagi informasi dengan orang-
orang lain.
▪ Setiap orang memiliki profil:
▪ Nama
▪ Informasi pribadi (hobi, agama ,dll)
▪ Kontak (email, no hp, dll)
▪ Foto, video, dll
▪ Almamater, kantor, komunitas, dll
37
Medsos: ancaman
▪ Phishing
▪ Identity theft
▪ Malware
▪ Site flaws
▪ URL Spoofing
▪ Clickjacking /
Likejacking
▪ Social engineering
▪ Direct approach
▪ Indirect approach
38
Medsos: tips
▪ Tips:
▪ Password
▪ Iklan / link
▪ Friend request
▪ Informasi yang diposting
▪ Pengaturan privasi
▪ Geotagging
39
40
41
42
6. CLOUD
Cloud
▪ Based on user
▪ Private
▪ Public
▪ Community
▪ Hybrid
▪ Based on service
▪ IaaS
▪ PaaS
▪ SaaS
43
Cloud
▪ Advantages
▪ Flexible
▪ Cost effective
▪ Portable
▪ Privacy issues
▪ Data ownership
▪ Data location
▪ Data migration
▪ Data permanency
▪ Threats
▪ Data breach
▪ Data loss
▪ Account hacking
▪ Disgruntled employee
▪ Technology loopholes
▪ Shared space
44
Cloud
▪ Mitigation
▪ Backup data
▪ Update backup
▪ Strong password
▪ 2 Factor authentication
▪ Encrypt
▪ Discipline behavior
▪ Avoid upload sensitive data
▪ Choosing cloud
▪ How much space?
▪ How much cost?
▪ Customer service
▪ Customer review
▪ Security
▪ Data loss plan
▪ Location
▪ Up time warranty
45
46
7. JARINGAN
47
Jaringan
▪ Jaringan
▪ LAN/MAN/WAN
▪ WPAN/WLAN/WMAN/W
WAN
▪ Wireless security
▪ WEP/WPA/WPA2/WPA3
▪ Bluetooth security
▪ Firewall
▪ Threats
▪ Evil twin, configuration
problem, war driver
48
VPN
▪ Secure?
▪ Private?
▪ Untrackable?
49
Sharing Session Internal : Computer Security

More Related Content

Similar to Sharing Session Internal : Computer Security

Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 

Similar to Sharing Session Internal : Computer Security (20)

Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Safety 101
Cyber Safety 101Cyber Safety 101
Cyber Safety 101
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 

More from pmgdscunsri

More from pmgdscunsri (15)

[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers
[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers
[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers
 
Leveling Up your Branding and Mastering MERN: Fullstack WebDev
Leveling Up your Branding and Mastering MERN: Fullstack WebDevLeveling Up your Branding and Mastering MERN: Fullstack WebDev
Leveling Up your Branding and Mastering MERN: Fullstack WebDev
 
Deep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptx
Deep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptxDeep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptx
Deep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptx
 
Firebase integration with Flutter
Firebase integration with FlutterFirebase integration with Flutter
Firebase integration with Flutter
 
Building a Flutter App.pptx
Building a Flutter App.pptxBuilding a Flutter App.pptx
Building a Flutter App.pptx
 
Dart Object-Oriented Programming (OOP) and Flutter State Management
Dart Object-Oriented Programming (OOP) and Flutter State ManagementDart Object-Oriented Programming (OOP) and Flutter State Management
Dart Object-Oriented Programming (OOP) and Flutter State Management
 
Convolutional Neural Networks (CNN) for Computer Vision - Day 4 Study Jams G...
Convolutional Neural Networks (CNN) for Computer  Vision - Day 4 Study Jams G...Convolutional Neural Networks (CNN) for Computer  Vision - Day 4 Study Jams G...
Convolutional Neural Networks (CNN) for Computer Vision - Day 4 Study Jams G...
 
Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...
Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...
Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...
 
Introduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptx
Introduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptxIntroduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptx
Introduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptx
 
Dart Basics & Introduction to Flutter Part 2.pptx
Dart Basics & Introduction to Flutter Part 2.pptxDart Basics & Introduction to Flutter Part 2.pptx
Dart Basics & Introduction to Flutter Part 2.pptx
 
Dart Basics & Introduction to Flutter Part 1
Dart Basics & Introduction to Flutter Part 1Dart Basics & Introduction to Flutter Part 1
Dart Basics & Introduction to Flutter Part 1
 
Seminar and DevTalk : Mastering UX Research - 5 Whys Framework
Seminar and DevTalk : Mastering UX Research - 5 Whys FrameworkSeminar and DevTalk : Mastering UX Research - 5 Whys Framework
Seminar and DevTalk : Mastering UX Research - 5 Whys Framework
 
Seminar and DevTalk : Mastering UX Research - What is UX Research
Seminar and DevTalk : Mastering UX Research - What is UX ResearchSeminar and DevTalk : Mastering UX Research - What is UX Research
Seminar and DevTalk : Mastering UX Research - What is UX Research
 
Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...
Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...
Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...
 
Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...
Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...
Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...
 

Recently uploaded

怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
amitlee9823
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
amitlee9823
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
amitlee9823
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
 

Sharing Session Internal : Computer Security

  • 1.
  • 2. 2 Esensi Computer Security Dalam Era Digitalisasi
  • 3. Security ▪ Tujuan ▪ Mencegah kehilangan/kerusakan data ▪ Mencegah pencurian/pembocoran data ▪ Penanganan insiden ▪ Sumber masalah ▪ Bencana alam ▪ Hacker, pencuri, virus ▪ Diri sendiri 3
  • 6.
  • 7.
  • 8. 6
  • 9. Pengenalan: data ▪ Data adalah kumpulan fakta: personal / organizational ▪ Daftar nomor telepon ▪ Hasil rekaman CCTV ▪ Transaksi kartu kredit ▪ Foto-foto ▪ Data yang sudah diolah dan memiliki makna substansial disebut informasi 7
  • 10. Pengenalan: ancaman ▪ Ancaman (threats) pada data: kehilangan/kerusakan data, pencurian data (kebocoran rahasia) karena ▪ Bencana alam ▪ Orang lain (hacker, pencuri, malware, dll) ▪ Diri sendiri 8
  • 11. Pengenalan: resiko ▪ Financial loss ▪ Unavailability of resources ▪ Identity theft & fraud ▪ Loss of trust ▪ Data loss / theft ▪ Misuse of computer resources 9
  • 12. Pengenalan: keamanan ▪ Tujuan: mencegah data hilang, data rusak & menangani insiden ▪ Elemen keamanan informasi ▪ Confidentiality ▪ Authenticity ▪ Integrity ▪ Availability ▪ Nonrepudiation 10
  • 13. Pengenalan: implementasi ▪ Precaution: antivirus, firewall, strong password, dll. ▪ Maintenance: backup, update patch, resource monitoring, dll. ▪ Reaction: power off, disconnect, reinstall, restore, dll. 11
  • 14. 12
  • 15. 13
  • 16. 14
  • 18. OS ▪ Fungsi sistem operasi: ▪ Mengontrol I/O ▪ Mengelola file dan folder ▪ Menangani resources ▪ Mengamankan perangkat dan data ▪ Aktivitas pengamanan OS: ▪ Update patch ▪ Penggunaan antivirus & firewall ▪ Enkripsi ▪ Konfigurasi akun user ▪ Monitoring proses, services, dll ▪ Backup & recovery 16
  • 19. OS: Fitur Penting ▪ Windows 10 ▪ Windows security (firewall, defender) ▪ Family options ▪ Backup options (system image, file history) ▪ Encryption (EFS, BitLocker) ▪ Jump list ▪ UAC ▪ Mac OS X ▪ Parental Control ▪ Time Machine ▪ Encryption (FileVault) ▪ Automatic login 17
  • 21. Malware ▪ Virus ▪ Trojan ▪ Worm ▪ Spyware ▪ Ransomware ▪ Rootkit ▪ ... 19
  • 22. 20
  • 23. 21
  • 24. Malware: Ciri-ciri ▪ Slow ▪ Pop up ▪ Crash / BSOD ▪ Suspicious hard drive activity ▪ Antivirus, firewall, update disabling ▪ New browser homepage ▪ Peculiar program activity ▪ Random network activity ▪ Blacklisted IP address 22
  • 25. Antivirus ▪ Kompatibel? ▪ Kualitas? ▪ Efektivitas ▪ Frekuensi update ▪ Efisiensi ▪ Mudah digunakan? ▪ Harga? 23
  • 26. Antivirus ▪ Techniques ▪ Scanning ▪ Integrity checking ▪ Actions ▪ Clean ▪ Quarantine ▪ Delete 24
  • 27. Antivirus ▪ Limitation ▪ Limited detection techniques ▪ Doesn’t fully protect ▪ Slows down PC/network ▪ Conflicts 25
  • 29. Internet ▪ Ancaman keamanan di Internet ▪ Data: pembocoran, pencurian identitas, penipuan melalui social engineering ▪ Malware ▪ Keamanan anak: ▪ Pornografi: stealth sites, misdirected search/URL, iklan-iklan ▪ Cyberbullying: medsos, chat room, email ▪ Pedofil: medsos, chat room, email 27
  • 31. 29
  • 32. Internet: browser ▪ Mengamankan browser: ▪ Konfigurasi keamanan dan privasi, tracking, cookie, filter ▪ Update patch ▪ Memonitor alerts ▪ Menghindari wi-fi publik ▪ Menginstall plugin keamanan ▪ Menggunakan website HTTPS ▪ Menonaktifkan script: Java, ActiveX, cookies, extension 30
  • 33. Internet: IM ▪ Fitur-fitur ▪ Chat ▪ Mengirim gambar, video, tautan, musik ▪ File sharing ▪ Ancaman keamanan ▪ Privasi ▪ Identitas palsu ▪ Malware 31
  • 34. Internet: keamanan anak ▪ Ancaman keamanan anak di Internet: ▪ Cyberbullying ▪ Pornografi ▪ Stealth site ▪ Misdirected search ▪ Grooming ▪ Ancaman di media sosial ▪ Spam ▪ Ancaman di chat rooms 32
  • 35. Internet: keamanan anak ▪ Langkah-langkah melindungi anak dari masalah online: ▪ Pencegahan: pendidikan, monitoring, limitasi ▪ Kenali ciri-ciri anak yang mengalami masalah online ▪ Latih anak agar melaporkan hal-hal mencurigakan ▪ Apa yang harus dilakukan jika anak menjadi korban: ▪ Abaikan semua komunikasi dari predator ▪ Hentikan aktivitas di situs/media tersebut ▪ Blokir akun-akun yang terkait ▪ Jika perlu: hapus akun anak 33
  • 37. 35
  • 38. 36
  • 39. Medsos ▪ Media sosial: situs/aplikasi online untuk terhubung, dan berbagi informasi dengan orang- orang lain. ▪ Setiap orang memiliki profil: ▪ Nama ▪ Informasi pribadi (hobi, agama ,dll) ▪ Kontak (email, no hp, dll) ▪ Foto, video, dll ▪ Almamater, kantor, komunitas, dll 37
  • 40. Medsos: ancaman ▪ Phishing ▪ Identity theft ▪ Malware ▪ Site flaws ▪ URL Spoofing ▪ Clickjacking / Likejacking ▪ Social engineering ▪ Direct approach ▪ Indirect approach 38
  • 41. Medsos: tips ▪ Tips: ▪ Password ▪ Iklan / link ▪ Friend request ▪ Informasi yang diposting ▪ Pengaturan privasi ▪ Geotagging 39
  • 42. 40
  • 43. 41
  • 45. Cloud ▪ Based on user ▪ Private ▪ Public ▪ Community ▪ Hybrid ▪ Based on service ▪ IaaS ▪ PaaS ▪ SaaS 43
  • 46. Cloud ▪ Advantages ▪ Flexible ▪ Cost effective ▪ Portable ▪ Privacy issues ▪ Data ownership ▪ Data location ▪ Data migration ▪ Data permanency ▪ Threats ▪ Data breach ▪ Data loss ▪ Account hacking ▪ Disgruntled employee ▪ Technology loopholes ▪ Shared space 44
  • 47. Cloud ▪ Mitigation ▪ Backup data ▪ Update backup ▪ Strong password ▪ 2 Factor authentication ▪ Encrypt ▪ Discipline behavior ▪ Avoid upload sensitive data ▪ Choosing cloud ▪ How much space? ▪ How much cost? ▪ Customer service ▪ Customer review ▪ Security ▪ Data loss plan ▪ Location ▪ Up time warranty 45
  • 49. 47
  • 50. Jaringan ▪ Jaringan ▪ LAN/MAN/WAN ▪ WPAN/WLAN/WMAN/W WAN ▪ Wireless security ▪ WEP/WPA/WPA2/WPA3 ▪ Bluetooth security ▪ Firewall ▪ Threats ▪ Evil twin, configuration problem, war driver 48